Authenticating cropped and resized images using distributed source coding and expectation maximization
نویسندگان
چکیده
Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to distinguish the legitimate diversity of encoded images from tampering but also localize the tampered regions in an image already deemed to be inauthentic. The authentication data supplied to the decoder consisted of a Slepian-Wolf encoded image projection. We extend our scheme to authenticate cropped and resized images using an Expectation Maximization algorithm. Experimental results demonstrate that the proposed algorithm can distinguish legitimate encodings of authentic cropped and resized images from illegitimately modified versions using authentication data of less than 250 bytes.
منابع مشابه
Image Authentication Using Distributed Source Coding a Dissertation Submitted to the Department of Electrical Engineering and the Committee on Graduate Studies of Stanford University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy
Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original image might exist. In addition, intermediaries might tamper with the contents. Distinguishing legitimate diversity from malicious manipulations is the challenge addressed in this dissertation. We propose an approach using ...
متن کاملQuantitative SPECT and planar 32P bremsstrahlung imaging for dosimetry purpose –An experimental phantom study
Background: In this study, Quantitative 32P bremsstrahlung planar and SPECT imaging and consequent dose assessment were carried out as a comprehensive phantom study to define an appropriate method for accurate Dosimetry in clinical practice. Materials and Methods: CT, planar and SPECT bremsstrahlung images of Jaszczak phantom containing a known activity of 32P were acquired. In addition, Phanto...
متن کاملWyner-Ziv coding of video with unsupervised motion vector learning
Distributed source coding theory has long promised a new method of encoding video that is much lower in complexity than conventional methods. In the distributed framework, the decoder is tasked with exploiting the redundancy of the video signal. Among the difficulties in realizing a practical codec has been the problem of motion estimation at the decoder. In this paper, we propose a mechanism f...
متن کاملEecient Stochastic Source Coding and an Application to a Bayesian Network Source Model
Brendan J. Frey and Geoorey E. Hinton 1997. EEcient stochastic source coding and an application to a Bayesian network source model. The Computer Journal 40, 157{165. In this paper, we introduce a new algorithm called \bits-back coding" that makes stochastic source codes eecient. For a given one-to-many source code, we show that this algorithm can actually be more eecient than the algorithm that...
متن کاملWyner-ziv Coding of Stereo Images with Unsupervised Learning of Disparity
Wyner-Ziv coding can exploit the similarity of stereo images without communication among the cameras. For good compression performance, the disparity among the images should be known at the decoder. Since the Wyner-Ziv encoder has access only to one image, the disparity must be inferred from the compressed bitstream. We develop an Expectation Maximization algorithm to perform unsupervised learn...
متن کامل